[-- Attachment #1: Type: text/plain, Size: 438 bytes --] CVE-2021-28116 09.03.21 23:15 Squid through 4.14 and 5.x through 5.0.5, in some configurations, allows information disclosure because of an out-of-bounds read in WCCP protocol data. This can be leveraged as part of a chain for remote code execution as nobody. Upstream did not release a patch yet. CVE entry to be monitored for a fix. https://www.zerodayinitiative.com/advisories/ZDI-21-157/ - says it is a low impact issue. [-- Attachment #2: This is a digitally signed message part --] [-- Type: application/pgp-signature, Size: 833 bytes --]
[-- Attachment #1: Type: text/plain, Size: 320 bytes --] I'm forwarding this to bug-guix@gnu.org so that it won't be forgotten. Mark -------------------- Start of forwarded message -------------------- Subject: squid package vulnerable to CVE-2021-28116 From: Léo Le Bouter <lle-bout@zaclys.net> To: guix-devel@gnu.org Date: Wed, 10 Mar 2021 01:22:51 +0100 [-- Attachment #2.1: Type: text/plain, Size: 427 bytes --] CVE-2021-28116 09.03.21 23:15 Squid through 4.14 and 5.x through 5.0.5, in some configurations, allows information disclosure because of an out-of-bounds read in WCCP protocol data. This can be leveraged as part of a chain for remote code execution as nobody. Upstream did not release a patch yet. CVE entry to be monitored for a fix. https://www.zerodayinitiative.com/advisories/ZDI-21-157/ - says it is a low impact issue. [-- Attachment #2.2: This is a digitally signed message part --] [-- Type: application/pgp-signature, Size: 833 bytes --] [-- Attachment #3: Type: text/plain, Size: 67 bytes --] -------------------- End of forwarded message --------------------
[-- Attachment #1: Type: text/plain, Size: 48 bytes --] Still no fix available from upstream (unclear) [-- Attachment #2: This is a digitally signed message part --] [-- Type: application/pgp-signature, Size: 833 bytes --]
Hello,
Mark H Weaver <mhw@netris.org> writes:
> I'm forwarding this to bug-guix@gnu.org so that it won't be forgotten.
>
> Mark
>
> -------------------- Start of forwarded message --------------------
> Subject: squid package vulnerable to CVE-2021-28116
> From: Léo Le Bouter <lle-bout@zaclys.net>
> To: guix-devel@gnu.org
> Date: Wed, 10 Mar 2021 01:22:51 +0100
>
> CVE-2021-28116 09.03.21 23:15
> Squid through 4.14 and 5.x through 5.0.5, in some configurations,
We're now using squid 4.17.
Closing.
Thanks,
Maxim